• Title/Summary/Keyword: information security system

Search Result 6,591, Processing Time 0.039 seconds

Selective Encryption Scheme for Vector Map Data using Chaotic Map

  • Bang, N.V.;Moon, Kwang-Seok;Lim, Sanghun;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.7
    • /
    • pp.818-826
    • /
    • 2015
  • With the rapid interest in Geographic Information System (GIS) contents, a large volume of valuable GIS dataset has been distributed illegally by pirates, hackers, or unauthorized users. Therefore the problem focus on how to protect the copyright of GIS vector map data for storage and transmission. But GIS vector map data is very large and current data encryption techniques often encrypt all components of data. That means we have encrypted large amount of data lead to the long encrypting time and high complexity computation. This paper presents the selective encryption scheme using hybrid transform for GIS vector map data protection to store, transmit or distribute to authorized users. In proposed scheme, polylines and polygons in vector map are targets of selective encryption. We select the significant objects in polyline/polygon layer, and then they are encrypted by the key sets generated by using Chaotic map before changing them in DWT, DFT domain. Experimental results verified the proposed algorithm effectively and error in decryption is approximately zero.

Vector Map Data compression based on Douglas Peucker Simplification Algorithm and Bin Classification (Douglas Peucker 근사화 알고리즘과 빈 분류 기반 벡터 맵 데이터 압축)

  • Park, Jin-Hyeok;Jang, Bong Joo;Kwon, Oh Jun;Jeong, Jae-Jin;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.3
    • /
    • pp.298-311
    • /
    • 2015
  • Vector data represents a map by its coordinate and Raster data represents a map by its pixel. Since these data types have very large data size, data compression procedure is a compulsory process. This paper compare the results from three different methodologies; GIS (Geographic Information System) vector map data compression using DP(Douglas-Peucker) Simplification algorithm, vector data compression based on Bin classification and the combination between two previous methods. The results shows that the combination between the two methods have the best performance among the three tested methods. The proposed method can achieve 4-9% compression ratio while the other methods show a lower performance.

Design of Internet Phon(VoIP) System for Voice Security based on VPN (VPN 기반의 음성 보안을 위한 인터넷 텔레포니(VoIP) 시스템 설계)

  • Kim Suk-Hun;Kim Eun-Soo;Song Jung-Gil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.5
    • /
    • pp.942-949
    • /
    • 2006
  • The VoIP(Voice over IP) has been worldwide used and already put to practical use in many fields. However, it is needed to ensure secret of VoIP call in a special situation. It is relatively difficult to eavesdrop the commonly used PSTN in that it is connected with 1:1 circuit. However, it is difficult to ensure the secret of call on Internet because many users can connect to the Internet at the same time. Therefore, this paper suggests a new model of Internet telephone for eavesdrop prevention enabling VoIP(using SIP protocol) to use the VPN protocol and establish the probability of practical use comparing it with Internet telephone.

Multi-objects detection using HOG and effective individual object tracking (HOG를 이용한 다중객체 검출과 효과적인 개별객체 추적)

  • Choi, Min;Lee, Kyu-won
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.894-897
    • /
    • 2012
  • We propose a effective method using the HOG (Histogram of Oriented Gradients) feature vector to track individual objects in an environment which multiple objects are moving. The proposed algorithm consists of pre-processing, object detection and object tracking. We experimented with six videos which have various trajectories and the movement. When occlusion between objects was occurred, we identified individual object by using center and predicted coordinates of moving objects. The algorithm shows 85.45% of tracking rate in the videos we experimented. We expect the proposed system is utilized in security systems which require the alalysis of the position and motion pattern of objects.

  • PDF

Design of a new family of multi wavelength two-dimensional codes for optical code division multiple access networks (다파장 OCDMA 네트웍에서의 새로운 2차원 코드의 설계)

  • 유경식;박남규
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.1B
    • /
    • pp.31-41
    • /
    • 2000
  • It has been known that the optical code division multiple access (OCDMA) is a prominent future technology to support many simultaneous users and to increase transmission capacity of optical fiber. In this paper, we proposed the new construction of 2 dimensional code, which can be used as a codeword in temporal/wavelength OCDMA networks. New code family is obtained by extending the concept of Hamming correlation. All optical encoder and decoder for newly proposed code were also developed. In considering bit error ratio, we verified that new coding scheme outperforms conventional coding scheme by simulation. This system is applicable to asynchronous fast local area network, which needs a high security level and a flexible network configuration.

  • PDF

New Key Recovery System For IPSec(NKRS_IPSec) (IPSec을 위한 새로운 키 복구 시스템)

  • Kim, Jeong-Beom;Lee, Yun-Jeong;Park, Nam-Seop;Hyeon, Eun-Sil;Kim, Tai-Yun
    • Annual Conference of KIPS
    • /
    • 2001.04b
    • /
    • pp.693-696
    • /
    • 2001
  • 최근 네트워크 보안에 대한 사용이 증가하고 있다. 그러나 암호는 본래 가지고 있는 키 관리의 어려움 때문에 여러 가지 문제가 발생할 수 있다. 이러한 암호의 사용이 야기하는 역기능을 해소하고 순기능을 조장하기 위하여 키 복구 개념이 도입되었다. 이러한 키 복구 방법 중 본 논문에서는 캡슐화 방식을 사용한다. 하지만 이 방식에서의 문제점은 키 협상 부분에서 키 복구에 대한 부분도 협상해야 한다. 그렇기 때문에 복잡한 키 협상 자정이 더욱 복잡해지며 마찬가지 이유로 SPD(Security Policy Database) 역시 복잡해진다. 그리고 키 복구에 대한 정보를 정해진 시간을 주기로 계속 보내야 하기 때문에 네트워크 소스 역시 많이 소비된다. 이러한 점을 해결하고자 본 논문에서는 TOS(Type Of Service)의 4bit를 이용하여 한 번의 키 복구 정보를 보내고, 사용자가 이러한 서비스를 자신이 사용하고자 할 경우에만 선택할 수 있도록 함으로써 해결하였다.

  • PDF

Key Management for Wireless Interworking (무선 네트워크 연동을 위한 키 관리)

  • Cho, Tae-Nam;Han, Jin-Hee;Jun, Sung-Ik
    • The KIPS Transactions:PartC
    • /
    • v.14C no.1 s.111
    • /
    • pp.7-16
    • /
    • 2007
  • 3G telecommunication and wireless LAN provide various wireless communication services with their own native advantages and disadvantages. Currently WiBro service was developed to make up for the disadvantages of those services, and 3G-WLAN-WiBro underworking system which enables a user who uses triple-mode terminals to use those three networks was proposed. Even though each network adopts mutual authentication process between users and networks to provide security and accounting, they use different authentication protocols. In this paper, integrated authentication and key management protocol is proposed which makes use of previously used authentication information and supports safe roaming when a user moves from one network to another one under a same service provider on the 3G-WLAN-WiBro interworking network.

Laser Radar-Based Railroad Crossing Detection Device Developed for Crossing Security Device Integration (건널목 보안장치 통합화를 위한 레이저레이더기반 철도 건널목 지장물 검지장치 개발)

  • Baek, Jong-Hyen;Kim, Gon-Yop;Song, Yong-Soo;Oh, Seh-Chan;Kim, Yong-Kyu;Chae, Eun-Kyung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.5
    • /
    • pp.471-478
    • /
    • 2013
  • In this paper, we have designed and implemented an obstacle detecting device based laser radar. It is an alternative to solve through problem analysis of that are currently operated safety equipment and status research of domestic railway crossing. It is target to improve the safety and reliability of the rail traffic through effective obstacle detection at crossing account for a large proportion of train accidents. suggest a system to overcome the problems caused by aging and limitation of existing safety equipment. Design a crossing obstacle detection device that utilizes laser radar scanner, proved this through performance evaluation and testing of the prototype.

B-Corr Model for Bot Group Activity Detection Based on Network Flows Traffic Analysis

  • Hostiadi, Dandy Pramana;Wibisono, Waskitho;Ahmad, Tohari
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.10
    • /
    • pp.4176-4197
    • /
    • 2020
  • Botnet is a type of dangerous malware. Botnet attack with a collection of bots attacking a similar target and activity pattern is called bot group activities. The detection of bot group activities using intrusion detection models can only detect single bot activities but cannot detect bots' behavioral relation on bot group attack. Detection of bot group activities could help network administrators isolate an activity or access a bot group attacks and determine the relations between bots that can measure the correlation. This paper proposed a new model to measure the similarity between bot activities using the intersections-probability concept to define bot group activities called as B-Corr Model. The B-Corr model consisted of several stages, such as extraction feature from bot activity flows, measurement of intersections between bots, and similarity value production. B-Corr model categorizes similar bots with a similar target to specify bot group activities. To achieve a more comprehensive view, the B-Corr model visualizes the similarity values between bots in the form of a similar bot graph. Furthermore, extensive experiments have been conducted using real botnet datasets with high detection accuracy in various scenarios.

ObjectPeerWork : Framework for the Development of Peer-to-Peer Applications based on Shared Object Model (ObjectPeerWork : 공유 객체 모델 기반의 피어투피어 어플리케이션 개발을 위한 프레임워크)

  • Kang, Un-Gu;Wang, Chang-Jong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.7 no.6
    • /
    • pp.630-640
    • /
    • 2001
  • In this paper, we describe the design and implementation of ObjectPeerWork, which is a framework for the development of shared object model-based P2P(Peer-to-Peer) applications. The shared object model can prevent the computing power decrease on the way of resource management by incorporating the resource management function into resources themselves, and raise reliability on shared resources by improving the security problems. Also this model assures expandability by means of distributed component-based request broker manager and module container. The ObjectPeerWork based on this shared object model is a framework which makes the implementation of the enterprise information system possible, and makes distribution of the computing power and efficient resource management possible by improving the weakness in the general P2P model.

  • PDF